漏洞信息详情

rdesktop 缓冲区错误漏洞

  • CNNVD编号:CNNVD-201902-278
  • 危害等级: 高危
  • CVE编号: CVE-2018-20178
  • 漏洞类型: 缓冲区错误
  • 发布时间: 2019-02-05
  • 威胁类型: 远程
  • 更新时间: 2019-09-16
  • 厂        商:
  • 漏洞来源: Debian,Eyal Itkin,...

漏洞简介

rdesktop是一款开源的远程桌面客户端程序。

rdesktop 1.8.3及之前版本中存在越界读取漏洞,该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。

漏洞公告

目前厂商已发布升级补丁以修复漏洞,补丁获取链接:

https://github.com/rdesktop/rdesktop/releases/tag/v1.8.4

参考网址

来源:MISC

链接:https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1

来源:BID

链接:http://www.securityfocus.com/bid/106938

来源:CONFIRM

链接:https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/

来源:GENTOO

链接:https://security.gentoo.org/glsa/201903-06

来源:BID

链接:https://www.securityfocus.com/bid/106938

来源:DEBIAN

链接:https://www.debian.org/security/2019/dsa-4394

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671367

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671363

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671361

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671359

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671358

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671356

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670425

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670424

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670423

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670422

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670417

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670416

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670413

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670412

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670410

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670409

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670408

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670406

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670404

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670403

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670401

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670400

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670393

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670392

来源:bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670384

来源:www.oracle.com

链接:https://www.oracle.com/technetwork/topics/security/linuxbulletinapr2019-5461367.html

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8800

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8799

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8798

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8797

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8796

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8795

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8794

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8793

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8792

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8791

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8789

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8788

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8787

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8786

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8785

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-8784

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-20182

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-20181

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-20180

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-20179

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-20178

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-20177

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-20176

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-20175

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2018-20174

来源:github.com

链接:https://github.com/rdesktop/rdesktop/releases

来源:www.rdesktop.org

链接:https://www.rdesktop.org/

来源:github.com

链接:https://github.com/rdesktop/rdesktop/commit/766ebcf6f23ccfe8323ac10242ae6e127d4505d2

来源:github.com

链接:https://github.com/FreeRDP/FreeRDP/releases

来源:www.freerdp.com

链接:http://www.freerdp.com/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html

来源:www.debian.org

链接:http://www.debian.org/security/2019/dsa-4394

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/152037/Gentoo-Linux-Security-Advisory-201903-06.html

来源:www.securityfocus.com

链接:http://www.securityfocus.com/bid/106938

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/151744/Debian-Security-Advisory-4394-1.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2018-20178

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/75790

来源:www.securityfocus.com

链接:https://www.securityfocus.com/bid/106938

受影响实体

    暂无


补丁

    暂无

漏洞信息快速查询

相关漏洞

更多